0

CISOs Share Their 3 Top Challenges for Cybersecurity Management

Thứ Ba, 28 tháng 2, 2023
The biggest dilemmas in running a modern cybersecurity team are not all about software, said CISOs from HSBC, Citi, and Sepio.
0

Two of The Worst Healthcare Data Breaches in US History Happened Last Year

0

LastPass DevOps Engineer Targeted for Cloud Decryption Keys in Latest Breach Revelation

The adversaries obtained a decryption key to a LastPass database containing multifactor authentication and federation information as well as customer vault data, company says.
0

Exfiltrator-22: The Newest Post-Exploitation Toolkit Nipping at Cobalt Strike's Heels

The framework-as-a-service signals an intensification of the cat-and-mouse game between defenders detecting lateral movement, and cybercriminals looking to go unnoticed.
0

US Marshals Ransomware Hit Is 'Major' Incident

Unknown attackers made off with a raft of PII, the Justice Department says — but witnesses in the protection program are still safe.
0

WannaCry Hero & Kronos Malware Author Named Cybrary Fellow

Marcus Hutchins, who set up a "kill switch" that stopped WannaCry's spread, later pled guilty to creating the infamous Kronos banking malware.
0

Pernicious Permissions: How Kubernetes Cryptomining Became an AWS Cloud Data Heist

The opportunistic "SCARLETEEL" attack on a firm's Amazon Web Services account turns into targeted data theft after the intruder uses an overpermissioned service to jump into cloud system.
0

Attackers Were on Network for 2 Years, News Corp Says

Thứ Hai, 27 tháng 2, 2023
The publisher of the Wall Street Journal, New York Post, and several other publications had last year disclosed a breach it said was the work of a state-backed actor likely working for China.
0

Wiz Reaches $10B Valuation With Consolidated Cloud Security Platform

Cloud security vendor Wiz has raised $900 million since its founding in 2020.
0

Vouched Raises $6.3M to Expand AI Identity Verification Offering to Telemedicine and Healthcare

Vouched now covers more than 85% of the global population, as demand accelerates for its platform to securely automate KYC and KYP compliance to better serve patients and drive revenue.
0

Palo Alto Announces Zero-Trust Security Solution for OT

New Zero Trust OT Security solution secures critical infrastructure without additional sensors.
0

Mobile Banking Trojans Surge, Doubling in Volume

Mobile malware developers were busy bees in 2022, flooding the cybercrime landscape with twice the number of banking trojans than the year before.
0

ThreatHunter.ai Launches "More Eyes" Program to Help Large Organizations Mitigate Cyber Threats

0

How the Ukraine War Opened a Fault Line in Cybercrime, Possibly Forever

Infighting, conscription, emigration. The war in Ukraine has pitted cybercriminals against one another like no other event before it.
0

As Social Engineering Attacks Skyrocket, Evaluate Your Security Education Plan

Build a playbook for employees on how to handle suspicious communications, use mail filters, and screen and verify unfamiliar calls to bolster a defensive social engineering security strategy.
0

Canadian Telecom Firm Telus Reportedly Investigating Breach

Thứ Sáu, 24 tháng 2, 2023
A threat actor has leaked data — purportedly, samples of Telus employee payroll data and source code — on a hacker site.
0

'New Class of Bugs' in Apple Devices Opens the Door to Complete Takeover

With the right kind of exploit, there's hardly any function, app, or bit of data an attacker couldn't access on your Mac, iPad, or iPhone.
0

Evaluating the Cyber War Set Off by Russian Invasion of Ukraine

Preparation and cooperation helped to mitigate the worst of the digital damage, amid cyber sorties from all sides.
0

Generative AI Changes Everything We Know About Cyberattacks

Thứ Năm, 23 tháng 2, 2023
Generative AI is heating up everywhere and fundamentally changing everything we know about how cybercriminals develop and deploy attacks.
0

Hydrochasma Threat Group Bombards Targets with Slew of Commodity Malware, Tools

A previously unidentified threat group uses open source malware and phishing to conduct cyber-espionage on shipping and medical labs associated with COVID-19 treatments and vaccines.
0

Wiper Malware Surges Ahead, Spiking 53% in 3 Months

Cybercriminals and hacktivists have joined state-backed actors in using sabotage-bent malware in destructive attacks, new report shows.
0

Why Are My Employees Integrating With So Many Unsanctioned SaaS Apps?

Before adopting SaaS apps, companies should set security guardrails to vet new vendors and check security integration for misconfiguration risks.
0

Top Takeaways From CloudNativeSecurityCon 2023

CloudNativeSecurityCon North America 2023 was a vendor-neutral cloud-native security conference. Here's why it was important.
0

This Will Be the Year of the SBOM, for Better or for Worse

Sharing attestations on software supply chain data that are formed into a policy will give us a framework to interpret risk and develop compliance directives.
0

1 in 4 CISOs Wants to Say Sayonara to Security

Thứ Tư, 22 tháng 2, 2023
Thanks to burnout and stress, Gartner predicts churn and even departure from profession among half of today's security leaders by 2025.
0

US Military Emails Exposed via Cloud Account

A DoD email server hosted in the cloud (and now secured) had no password protection in place for at least two weeks.
0

Google Delivers Record-Breaking $12M in Bug Bounties

Google's Android and Chrome Vulnerability Reward Programs (VRPs) in particular saw hundreds of valid reports and payouts for security vulnerabilities discovered by ethical hackers.
0

Xcitium Brings 'Zero Dwell' Capability to Legacy EDR Platforms

0

Black Hat to Launch Official Certification Program

Thứ Ba, 21 tháng 2, 2023
0

Analysts Slam Twitter's Decision to Disable SMS-Based 2FA

Making the option available only to paid subscribers — while also claiming SMS authentication is broken — doesn't make sense, some say. Is it a cash grab?
0

Cyberthreats, Regulations Mount for Financial Industry

Nation-state adversaries, new reporting regulations, and a fast-paced threat landscape mean that financial services and technology firms need to bolster their security posture.
0

Name That Toon: Join the Club

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
0

Israel's Top Tech University Targeted by DarkBit Ransomware

An Israeli university is being blackmailed by hackers. However, they aren't just after money but are looking to send a political message — and maybe something more.
0

Insider Threats Don't Mean Insiders Are Threatening

By implementing tools that enable internal users to do their jobs efficiently and securely, companies reduce insider threat risk by building insider trust.
0

Modern Software: What's Really Inside?

Thứ Hai, 20 tháng 2, 2023
Open source has changed the software game from build or buy to assemble with care.
0

Majority of Ransomware Attacks Last Year Exploited Old Bugs

New research shows that 57 vulnerabilities that threat actors are currently using in ransomware attacks enable everything from initial access to data theft.
0

Is OWASP at Risk of Irrelevance?

Thứ Sáu, 17 tháng 2, 2023
A growing group of OWASP members and board leaders are calling for the AppSec group to make big changes to stay apace with modern development.
0

Novel Spy Group Targets Telecoms in 'Precision-Targeted' Cyberattacks

The primary victims so far have been employees of telcos in the Middle East, who were hit with custom backdoors via the cloud, in a likely precursor to a broader attack.
0

Google Translate Helps BEC Groups Scam Companies in Any Language

BEC gangs Midnight Hedgehog and Mandarin Capybara show how online marketing and translation tools are making it easy for these threat groups to scale internationally.
0

Not Stoked: Burton Snowboards' Online Orders Disrupted After Cyberattack

The snow sports specialist is investigating to see what caused the operations-disrupting "cyber incident."
0

Massive GoAnywhere RCE Exploit: Everything You Need to Know

Weeks after an exploit was first announced in a popular cloud-based file transfer service, could some organizations still be vulnerable? The answer is yes.
0

Encrypted Traffic, Once Thought Safe, Now Responsible For Most Cyberthreats

It's a classic attacker move: Use security protections against those who deploy them. But organizations can still defuse and prevent these encrypted attacks.
0

Atlassian: Leaked Data Stolen via Third-Party App

Thứ Năm, 16 tháng 2, 2023
SiegedSec threat group leaked data that Atlassian says was taken from app used to coordinate in-office resources.
0

SASE Market to Exceed Over $60B Between 2022 and 2027, According to Dell'Oro Group

0

MVP Vibe Fest Bridges Gap Between Athletics and Cybersecurity

Top athletes compete both on and off the track in a mix of track and field events and cyber games.
0

WatchGuard Launches New Line of Firewall Products to Enhance Unified Security for Remote and Distributed Businesses

Powered by WatchGuard’s Unified Security Platform® architecture, new Fireboxes deliver enhanced performance and added security capabilities that MSPs and IT admins can easily manage in WatchGuard Cloud.
0

Infrastructure Risks Increase As IT and OT Converge

Explosive growth of devices associated with the Internet of Things and operational technologies gives attackers a larger pool of targets.
0

SideWinder APT Spotted Stealing Crypto

The nation-state threat group has been attacking a wider range of victims and regions than previously thought.
0

ChatGPT Subs In as Security Analyst, Hallucinates Only Occasionally

Thứ Tư, 15 tháng 2, 2023
Incident response triage and software vulnerability discovery are two areas where the large language model has demonstrated success, although false positives are common.
0

2023 Is the Year of Risk: 5 Ways to Prepare

2022 saw a record number of cyberattacks. In response, regulators are prescribing how companies should manage their risks. How do you prepare?
0

3 Ways CISOs Can Lead Effectively and Avoid Burnout

Information security is a high-stakes field with sky-high expectations. Here's how CISOs can offset the pressures and stay healthy.
0

What Purple Teams Wish Companies Knew

Here are some of the easily avoidable mistakes most companies made last year, gleaned from hundreds of cybersecurity engagements by red and blue teams.
0

Build Cyber Resiliency With These Security Threat-Mitigation Considerations

CISOs need to define their risk tolerance, identify specific critical data, and make changes based on strategic business goals.
0

IGEL Unveils COSMOS, the Unified End User Computing Platform for Secure, Managed Access to Any Cloud Workspace

0

How Security Teams Can Protect Employees Beyond Corporate Walls

De-shaming security mistakes and taking the blame and punishment out of incident reporting can strengthen security efforts both inside and outside of the workplace.
0

9 New Microsoft Bugs to Patch Now

Thứ Ba, 14 tháng 2, 2023
78 new CVEs patched in this month's batch — nearly half of which are remotely executable and three of which attackers already are exploiting.
0

Oakland City Services Struggle to Recover From Ransomware Attack

Fire emergency, 911 services functioning, along with Oakland financial systems, city says.
0

Hospitals Sued for Using Meta's Ad-Tracking Code, Violating HIPAA

Lawsuits say hospitals using Meta Pixel code violated patient privacy — sharing conditions, medications, and more with Facebook.
0

Why SecDataOps Is the Future of Your Security Program

The goal: Ensure that data is always finely curated and accessible, and that security decisions get made with high-fidelity data.
0

Cyber-Physical Systems Vulnerability Disclosures Reach Peak, While Disclosures by Internal Teams Increase 80% Over 18 Months

State of XIoT Security Report: 2H 2022 from Claroty's Team82 reveals positive impact by researchers on strengthening XIoT security and increased investment among XIoT vendors in securing their products.
0

Lessons All Industries Can Learn From Automotive Security

Industry standards must evolve as digital transformation makes all companies software companies. Security testing boosts development speed and software quality.
0

Embattled VMware ESXi Hypervisor Flaw Exploitable in Myriad Ways

It's not just Internet-accessible hosts that are vulnerable, researchers say.
0

Dark Web Revenue Down Dramatically After Hydra's Demise

Thứ Hai, 13 tháng 2, 2023
Competitor markets working to replace Hydra's money-laundering services for cybercriminals.
0

9 Scammers Busted for 5M Euro Phishing Fraud Ring

The network is alleged to have operated 100 bank accounts and stolen millions from American people and companies.
0

Healthcare in the Crosshairs of North Korean Cyber Operations

CISA, FBI, and South Korean intelligence agencies warn that the North Korean government is sponsoring ransomware attacks to fund its cyber-espionage activities.
0

Russian Hackers Disrupt NATO Earthquake Relief Operations

Killnet claims DDoS attack against NATO Special Operations Headquarters, Strategic Airlift Capability, and more.
0

What Happened to #OpRussia?

The cyberwar to attack Russia has never really stopped, despite a decreasing interest from the West.
0

Reddit Hack Shows Limits of MFA, Strengths of Security Training

Thứ Sáu, 10 tháng 2, 2023
A tailored spear-phishing attack successfully convinced a Reddit employee to hand over their credentials and their one-time password, but soon after, the same worker notified security.
0

Integreon Launches Cyber Incident Response Offering with Development of AI-Based Review and Integration of RadarFirst

0

Malicious Game Mods Target Dota 2 Game Users

Valve's unpatched JavaScript engine and incomplete modification vetting process for Steam-delivered mods led to user systems being backdoored.
0

NewsPenguin Goes Phishing for Maritime & Military Secrets

Thứ Năm, 9 tháng 2, 2023
A sophisticated cyber-espionage attack against high-value targets attending a maritime technology conference in Pakistan this weekend has been in the works since last year.
0

SynSaber Releases ICS CVE Retrospective: 3 Years of CISA Advisories

0

Cryptographers Decode Secret Letters of Mary, Queen of Scots

Nearly a half-millennium after her execution, encrypted letters from the imprisoned royal offer a fascinating look into early cryptography.
0

Phishing Surges Ahead, as ChatGPT & AI Loom

AI and phishing-as-a-service (PaaS) kits are making it easier for threat actors to create malicious email campaigns, which continue to target high-volume applications using popular brand names.
0

NIST Picks IoT Standard for Small Electronics Cybersecurity

NIST announces that it will use Ascon as a cryptography standard for lightweight IoT device protection.
0

In Perfect Harmony: Cybersecurity Regulation Harmonization

By simplifying compliance management, security and risk teams can focus on managing operational risk, not compliance risk — and better counter threats.
0

Twitter Implements API Paywall, but Will That Solve Its Enormous Bot Crisis?

Restricting the Twitter API will have implications across Twitter, the broader Internet, and society, experts say. Is there a cybersecurity silver lining, or will threat actors pay to play?
0

Jailbreak Trick Breaks ChatGPT Content Safeguards

Thứ Tư, 8 tháng 2, 2023
Jailbreak command creates ChatGPT alter ego DAN, willing to create content outside of its own content restriction controls.
0

Exclu Shutdown Underscores Outsized Role Messaging Apps Play in Cybercrime

Apps like Telegram, WhatsApp, and Discord are a hotbed of cybercriminal communication and scams.
0

Skybox Security Appoints Cybersecurity Veteran Mordecai Rosen as CEO

Skybox closes $50 million in financing to drive growth of its SaaS-based security platform.
0

SecuriThings Brings Managed Service Capabilities to Physical Security, With New Managed Service Platform

Platform opens new opportunities for managed service providers to manage, visualize, and secure customer devices from a single pane of glass, including automated maintenance and other operations.
0

Toyota Global Supply Chain Portal Flaw Put Hacker in the Driver's Seat

The automaker closed a hole that allowed a security researcher to gain system administrator access to more than 14,000 corporate and partner accounts and troves of sensitive data.
0

'Money Lover' Finance App Exposes User Data

Thứ Ba, 7 tháng 2, 2023
A broken access control vulnerability could have led to dangerous follow-on attacks for users of the money-management app.
0

Fresh (Buggy) Clop Ransomware Variant Targets Linux Systems

For the moment, victims can decrypt data without paying a ransom. But Clop is a ransomware variant that has caused havoc on Windows systems, so that's bound to change.
0

DPRK Using Unpatched Zimbra Devices to Spy on Researchers

Lazarus Group used a known Zimbra bug to steal data from medical and energy researchers.
0

New Banking Trojan Targeting 100M Pix Payment Platform Accounts

New malware demonstrates how threat actors are pivoting toward payment platform attacks, researchers say.
0

Backdoor in Dingo Cryptocurrency Allows Creator to Steal (Nearly) Everything

A tax variable in the software implementing the Dingo Token allows the creators to charge 99% in fees per transaction, essentially stealing funds, an analysis finds.
0

ARMO Integrates ChatGPT to Help Users Secure Kubernetes

0

Keeping KillNet at Bay: Use the IP Address Blocklist

Security teams should use a blocklist containing tens of thousands of proxy IP addresses used by the pro-Russian hacktivist group to defend their organizations from DDoS attacks.
0

Crypto Drainers Are Ready to Ransack Investor Wallets

Thứ Hai, 6 tháng 2, 2023
Cryptocurrency drainers are the latest hot ticket being used in a string of lucrative cyberattacks aimed at virtual currency investors.
0

Global Ransomware Attack on VMware EXSi Hypervisors Continues to Spread

The fresh "ESXiArgs" malware is exploiting a 2-year-old RCE security vulnerability (tracked as CVE-2021-21974), resulting in thousands of unpatched servers falling prey to the campaign.
0

Cadien Cyber Response Launches to Deliver Incident Response & Complex Digital Forensics Services

0

Cybercrime Shows No Signs of Slowing Down

Look for recent trends in attacks, strategies, and vulnerabilities to continue gaining steam throughout 2023.
0

Patching & Passwords Lead the Problem Pack for Cyber-Teams

Despite growing awareness, organizations remain plagued with unpatched vulnerabilities and weaknesses in credential policies.
0

Name That Edge Toon: For the Birds

Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
0

Iran-Backed Actor Behind 'Holy Souls' Cyberattack on Charlie Hebdo, Microsoft Says

Thứ Sáu, 3 tháng 2, 2023
The January attack was in retaliation for the satirical French magazine's decision to launch a cartoon contest to lampoon Iran's Supreme Leader.
0

What CISOs Can Do About Brand Impersonation Scam Sites

Apply these 9 tips to proactively fight fraudulent websites that steal customers' trust, money, and personally identifiable information.
0

Scores of Redis Servers Infested by Sophisticated Custom-Built Malware

At least 1,200 Redis servers worldwide have been infected with "HeadCrab" cryptominers since 2021.
0

How the Cloud Is Shifting CISO Priorities

The greatly expanding attack surface created by the cloud needs to be protected.
0

MITRE Releases Tool to Design Cyber Resilient Systems

Engineers can use the Cyber Resiliency Engineering Framework Navigator to visuzalize their cyber resiliency capabilities.
0

Cyberattack on Fintech Firm Disrupts Derivatives Trading Globally

Thứ Năm, 2 tháng 2, 2023
The Russia-linked LockBit ransomware group claims to be behind the attack that fouled automated transactions for dozens of clients of financial technology firm ION Group.
0

Rising ‘Firebrick Ostrich’ BEC Group Launches Industrial-Scale Cyberattacks

The group's wanton attacks demonstrate that business email compromise is everything a hacker can want in one package: low risk, high reward, quick, easy, and low effort.
0

Nearly All Firms Have Ties With Breached Third Parties

Thứ Tư, 1 tháng 2, 2023
The average organization does business with 11 third parties, and 98% of organizations do business with a third party who has suffered a breach, an analysis finds.
0

CISA to Open Supply Chain Risk Management Office

A new supply chain risk management office aims to help public and private sectors implement recent CISA policies and guidance.
0

Greater Incident Complexity, Shift in How Threat Actors Use Stolen Data, Will Drive the Cyber Threat Landscape in 2023, Says Beazley Report

Noting 13% year-over-year growth in fraudulent instruction as a cause of loss, report predicts organizations must get smarter about educating employees to spot fraudulent tactics.
0

Inside Killnet: Pro-Russia Hacktivist Group's Support and Influence Grows

Killnet is building its profile, inspiring jewelry sales and rap anthems. But the impact of its DDoS attacks, like the ones that targeted 14 major US hospitals this week, remain largely questionable.
0

Beating the Odds: 3 Challenges Women Face in the Cybersecurity Industry

Companies need to be aware of the work culture they foster. Diversity and inclusion aren't just buzzwords. Increasing female visibility and improving female mentoring to help women enter and advance within the cybersecurity industry are key steps forward.
0

ManageEngine Study Finds United States Enterprises Hit by Short-Staffed Security Operations Centers

Study also reveals enterprises rely on multiple tools to ensure cloud security.